Abstract
The rapid developments of storage technology and information exchange encourage the development of research in the field of information security. In the process of sending information, tamper and issues about data ownership may occur. The fragile watermarking is one technique that can overcome the problem, in which this technique exploits sensitivity to tamper with the inserted watermark components. Therefore, it is not tolerable to change even only one bit. Self-embedding can be defined as some important features obtained from a selected image as a watermark by modifying the pixel value of the original image. Once a picture which has been inserted with a watermark is modified by other users, it can be used for tamper detection and recovery images. Due to the importance of this fragile watermarking scheme, this paper discusses the principles and characteristics of a fragile watermarking algorithm. The main contribution of this paper survey is that it summarises the current mechanisms of selection, generation, method of watermark insertion, detection and tamper localisation and recovery procedures. Comparison of several watermarking techniques was analysed and presented in tabular form, as well as experimental evaluation of four watermarking schemes in many graphs to show the performance of the self-embedding fragile watermarking scheme.
Highlights
The availability of image processing technology is highly diverse, an image content becomes manipulated by irresponsible parties
There are two watermarks which are used for authentication with recovery capability: authentication bit and restoration bit
Authentication bit is for tamper detection and localisation, while restoration bit is for tamper recovery in decoder side
Summary
The availability of image processing technology is highly diverse, an image content becomes manipulated by irresponsible parties. In the fragile watermarking technique that is being used for the authentication process, the embedded watermark vulnerability indicates that there are modifications either intentionally or unintentionally [2, 3, 11–24]. In semi-fragile watermarking techniques, there are common image processing methods, such as JPEG compression, scaling, sharpening; and tidy against deliberate manipulations, such as content modified by false. The LSB method, is generally preferred for embedding watermarks on fragile image watermarking. To facilitate the understanding of fragile watermarking, in addition to the discussion of conceptual understanding, this article explains the comparison of methods ranging from insertion, extraction and recovery results.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.